On 7/31/2012 1:08 PM, [email protected] wrote:

yinxing> In my view, we need to analyze the security threats and
requirements systematically, and then identify defensive techniques.

As I said, I don't know how it's possible to be systematic about
a thing that doesn't exist.  I understand that you're trying to
stick a stake in the ground but, well.

yinxing>Sometimes byzantine attack is possible. It may be more
acceptable to analyze possible attackes before making some assumptions.

Insider threats are not inherently "byzantine."  They are, however,
"common."

Melinda


_______________________________________________
nvo3 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nvo3

Reply via email to